I am running CE 9.0.2 in docker deployment.
It seems that the nginx config forwards everything to seahub, even potential attackers scanning the server for vulnerable services. This fills the log with stuff like this:
2022-02-06 23:12:21,039 [WARNING] django.request:224 log_response Not Found: /owa/auth/logon.aspx
2022-02-06 23:22:58,412 [WARNING] django.request:224 log_response Not Found: /admin/config.php
2022-02-07 00:16:13,758 [WARNING] django.request:224 log_response Not Found: /bag2
2022-02-07 00:38:16,179 [WARNING] django.request:224 log_response Not Found: /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
2022-02-07 01:20:02,903 [WARNING] django.request:224 log_response Not Found: /index.php
2022-02-07 03:05:48,151 [WARNING] django.request:224 log_response Not Found: /mifs/.;/services/LogService
2022-02-07 04:05:08,753 [WARNING] django.request:224 log_response Not Found: /login_sid.lua
2022-02-07 04:48:37,677 [WARNING] django.request:224 log_response Not Found: /Autodiscover/Autodiscover.xml
2022-02-07 11:23:54,153 [WARNING] django.request:224 log_response Not Found: /actuator/health
2022-02-07 13:32:44,916 [WARNING] django.request:224 log_response Not Found: /admin/config.php
I wonder if someoen has a good nginx sample configuration that would discard all of these requests. Actually I should be able to discard everything that is not according to the seafile base URL or the letsencrypt paths.
Any hints?
thanks!